Web
Nmap discovered a Web server on the target port 80
The running service is Apache httpd 2.4.52 ((Ubuntu))
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/bullybox]
└─$ curl -I -X OPTIONS http://$IP/
HTTP/1.1 200 OK
Date: Mon, 31 Mar 2025 16:21:52 GMT
Server: Apache/2.4.52 (Ubuntu)
Allow: GET,POST,OPTIONS,HEAD
Content-Length: 0
Content-Type: text/html
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/bullybox]
└─$ curl -i http://$IP/
HTTP/1.1 200 OK
Date: Mon, 31 Mar 2025 16:22:42 GMT
Server: Apache/2.4.52 (Ubuntu)
Last-Modified: Tue, 27 Jun 2023 04:35:09 GMT
ETag: "47-5ff14fe0675bb"
Accept-Ranges: bytes
Content-Length: 71
Vary: Accept-Encoding
Content-Type: text/html
<script>
window.location.href = "http://bullybox.local/"
</script>
Pointing to a domain; bullybox.local
The domain information has been appended to the
/etc/hosts
file on Kali for local DNS resolution
Webroot
It’s an instance of BoxBilling
BoxBilling is an open source billing and client management software
Source code is available for review
Admin Page
The admin page is located at
/bb-admin
endpoint
No credential is known at this time.
Version Information
The version is
4.22-beta.1.5
Vulnerabilities
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/bullybox]
└─$ searchsploit boxbilling 4.22
-------------------------------------------------------- ---------------------------------
Exploit Title | Path
-------------------------------------------------------- ---------------------------------
BoxBilling<=4.22.1.5 - Remote Code Execution (RCE) | php/webapps/51108.txt
-------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results
The target BoxBilling instance suffers from an authenticated RCE exploit; CVE-2022-3552
Fuzzing
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/bullybox]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://bullybox.local/FUZZ -ic -e .txt,.html,.php -fs 3971 -fc 403
/'___\ /'___\ /'___\
/\ \__/ /\ \__/ __ __ /\ \__/
\ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\
\ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/
\ \_\ \ \_\ \ \____/ \ \_\
\/_/ \/_/ \/___/ \/_/
v2.1.0-dev
________________________________________________
:: Method : GET
:: URL : http://bullybox.local/FUZZ
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
:: Extensions : .txt .html .php
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
:: Filter : Response status: 403
:: Filter : Response size: 3971
________________________________________________
.git [Status: 301, Size: 315, Words: 20, Lines: 10, Duration: 119ms]
LICENSE [Status: 200, Size: 11346, Words: 2514, Lines: 203, Duration: 159ms]
about-us [Status: 200, Size: 9436, Words: 3100, Lines: 210, Duration: 214ms]
balance [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 21ms]
bb-admin.txt [Status: 200, Size: 4029, Words: 1593, Lines: 4, Duration: 26ms]
bb-admin.html [Status: 200, Size: 4031, Words: 1593, Lines: 4, Duration: 26ms]
bb-admin [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 28ms]
bb-admin.php [Status: 200, Size: 4029, Words: 1593, Lines: 4, Duration: 18ms]
blog [Status: 200, Size: 10663, Words: 3398, Lines: 236, Duration: 271ms]
cart [Status: 200, Size: 9299, Words: 3074, Lines: 242, Duration: 266ms]
client [Status: 302, Size: 3994, Words: 1590, Lines: 4, Duration: 36ms]
contact-us [Status: 200, Size: 11039, Words: 4205, Lines: 282, Duration: 204ms]
dashboard [Status: 302, Size: 13538, Words: 5730, Lines: 375, Duration: 92ms]
email [Status: 302, Size: 8976, Words: 3239, Lines: 221, Duration: 104ms]
emails [Status: 302, Size: 8976, Words: 3239, Lines: 221, Duration: 80ms]
example [Status: 200, Size: 4185, Words: 1602, Lines: 4, Duration: 88ms]
forum [Status: 200, Size: 9808, Words: 3682, Lines: 234, Duration: 121ms]
index.php [Status: 200, Size: 10462, Words: 3564, Lines: 265, Duration: 230ms]
invoice [Status: 302, Size: 9558, Words: 3532, Lines: 238, Duration: 123ms]
kb [Status: 200, Size: 9522, Words: 3267, Lines: 222, Duration: 158ms]
login [Status: 200, Size: 14605, Words: 6197, Lines: 350, Duration: 108ms]
me [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 23ms]
news [Status: 200, Size: 10663, Words: 3398, Lines: 236, Duration: 240ms]
order [Status: 200, Size: 12532, Words: 4220, Lines: 302, Duration: 251ms]
privacy-policy [Status: 200, Size: 10669, Words: 3276, Lines: 216, Duration: 226ms]
rb.php [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 25ms]
reset-password [Status: 200, Size: 9393, Words: 3256, Lines: 226, Duration: 248ms]
robots.txt [Status: 200, Size: 716, Words: 77, Lines: 21, Duration: 26ms]
robots.txt [Status: 200, Size: 716, Words: 77, Lines: 21, Duration: 21ms]
service [Status: 302, Size: 9188, Words: 3322, Lines: 229, Duration: 162ms]
sitemap.xml [Status: 200, Size: 1719, Words: 295, Lines: 54, Duration: 106ms]
support [Status: 302, Size: 11285, Words: 4118, Lines: 294, Duration: 217ms]
tos [Status: 200, Size: 10263, Words: 3224, Lines: 210, Duration: 164ms]
:: Progress: [81912/81912] :: Job [1/1] :: 190 req/sec :: Duration: [0:05:15] :: Errors: 0 ::
.git
directory discovered
.git
directory
403 as expected.
Dumping the repository using git-dumper
Virtual Host / Sub-domain Discovery
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/bullybox]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt -u http://$IP/ -H 'Host: FUZZ.bullybox.local' -ic -mc all -fs 71
________________________________________________
:: Method : GET
:: URL : http://192.168.154.27/
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt
:: Header : Host: FUZZ.bullybox.local
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: all
:: Filter : Response size: 71
________________________________________________
:: Progress: [114437/114437] :: Job [1/1] :: 1851 req/sec :: Duration: [0:01:15] :: Errors: 0 ::
N/A